Datsys wrote:
Hi,
I am really new to this whole Yubikey thing and there are somethings I need to understand and get done. The first way I want to use the key is in static mode to generate the same password every time. First question is can I put in my own password like if I wanted to use one of GRCs super long passwords, instead of having the key create it automatically? Second question is can I have more than one key using the same passwrod? We have 4 other guys in Tech and we will all need to have those keys when on the road
Thanks for the help.
I, too, am pretty new to this, but here's how I understand it.
First, you can't have the Yubikey output one of GRC's passwords since the Yubikey will only output modhex characters. The modhex characters are cbdefghijklnrtuv equivalent to the hex characters 0123456789abcdef, respectively. This limited set of characters was chosen, I believe, because it is optimally consistent over keyboards in numerous languages.
You can use one of the GRC passwords as the input in Ferrix's script that's earlier in this thread. If you enter one of the GRC 64 hex character passwords, the resulting Yubikey static password output will be the 32 character modhex representation of the first 32 characters of the GRC password followed by another 32 characters that are created by the encryption process. If you use the same input into the script, you get the same result each time so there's no problem creating four identically coded static YKs. If you store the input string, you can use it at some point in the future to create additional YKs with that same static password.
If all you want to do is program static passwords, the use of Ferrix's script rather than the Yubico Personalization Tool is simpler and gives you the option of a full 64 character static password. As far as I can tell, the current Yubico tool only permits static passwords up to 56 characters.
For static password use, you might want to opt to leave off the "Enter" at the end of the password string. Since most sites/programs require you to reenter the password when you first set it, the "Enter" at the end of the string may make it impossible to get to the point of entering the verification. I would enter the password in the first blank, it would automatically generate the "Enter" and I'd get a message that the two entries didn't match. By doing away with the automatic "Enter" I was able to enter the password and the verification before manually pressing "Enter".
You mention being "on the road". If you are concerned about the possible loss of a YK that is set to static mode, you might want to consider a combination manually entered and YK entered password. For example, you type in "123456" without pressing "Enter" and then you trigger the YK. This gives you a password such as 123456cbdefghijklnrtuv...(up to 64 characters". That way, even a lost YK isn't going to get too far.
Keep in mind that once you've reprogrammed the YK to a static password, it will no longer function in OTP mode until properly reprogrammed using the Yubico Personalization Tool so that the authentication server can recognize the YK. While I've had no problem programming for static use, my efforts to reprogram one back to OTP use are, so far, without success. I point that out merely so that you realize that the reversal of the process may not be as simple as the conversion to static mode.
Dick